WO2023283902A1 - 一种报文传输方法及装置 - Google Patents
一种报文传输方法及装置 Download PDFInfo
- Publication number
- WO2023283902A1 WO2023283902A1 PCT/CN2021/106623 CN2021106623W WO2023283902A1 WO 2023283902 A1 WO2023283902 A1 WO 2023283902A1 CN 2021106623 W CN2021106623 W CN 2021106623W WO 2023283902 A1 WO2023283902 A1 WO 2023283902A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network device
- message
- mapping rule
- target
- scheduling
- Prior art date
Links
- 230000005540 biological transmission Effects 0.000 title claims abstract description 154
- 238000000034 method Methods 0.000 title claims abstract description 107
- 238000013507 mapping Methods 0.000 claims description 133
- 238000012545 processing Methods 0.000 claims description 19
- 230000003139 buffering effect Effects 0.000 claims description 15
- 238000004590 computer program Methods 0.000 claims description 12
- 238000005516 engineering process Methods 0.000 description 19
- 238000010586 diagram Methods 0.000 description 10
- 230000007246 mechanism Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 7
- 239000000872 buffer Substances 0.000 description 4
- 238000005538 encapsulation Methods 0.000 description 3
- 238000011084 recovery Methods 0.000 description 3
- 238000011144 upstream manufacturing Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 238000007493 shaping process Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000006798 recombination Effects 0.000 description 1
- 238000005215 recombination Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000001356 surgical procedure Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/24—Traffic characterised by specific attributes, e.g. priority or QoS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/28—Flow control; Congestion control in relation to timing considerations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/32—Flow control; Congestion control by discarding or delaying data units, e.g. packets or frames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/34—Flow control; Congestion control ensuring sequence integrity, e.g. using sequence numbers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/50—Queue scheduling
- H04L47/62—Queue scheduling characterised by scheduling criteria
- H04L47/621—Individual queue per connection or flow, e.g. per VC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0823—Errors, e.g. transmission errors
- H04L43/0829—Packet loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
- H04L43/0864—Round trip delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
- H04L43/087—Jitter
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/10—Active monitoring, e.g. heartbeat, ping or trace-route
- H04L43/106—Active monitoring, e.g. heartbeat, ping or trace-route using time related information in packets, e.g. by adding timestamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/31—Flow control; Congestion control by tagging of packets, e.g. using discard eligibility [DE] bits
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
Definitions
- the present application relates to the field of network technology, in particular to a message transmission method and device.
- the purpose of the embodiments of the present application is to provide a message transmission method and device, so as to improve the adaptability of deterministic transmission to WAN.
- the specific technical scheme is as follows:
- the embodiment of the present application provides a message transmission method, which is applied to the first network device, and the method includes:
- the received message After buffering the received message for a preset period of time, the received message is forwarded.
- the method also includes:
- the step of recombining the received message includes:
- the first mapping rule includes a scheduling queue; the scheduling queue is used to cache packets of the same flow.
- the first mapping rule includes a scheduling period, and the scheduling period is used to indicate a time period for packet forwarding
- the step of forwarding the received message includes:
- the received message is buffered for a preset time period, and then the received message is forwarded.
- the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device is greater than or equal to a target delay, and the target delay is the difference between the first network device and the second network device. Latency between second network devices.
- the first mapping rule includes the preset duration.
- the packet header of the packet carries the first mapping rule.
- the message header of the message carries a quintuple, and the quintuple is used to determine the flow to which the message belongs; or,
- the packet header of the message carries a target flow identifier, and the flow identifier is used to determine the flow to which the target packet belongs.
- the scheduling frequencies of the first network device and the second network device are the same, and the scheduling frequency is a frequency for dividing a scheduling period.
- the method also includes:
- the quality of service includes delay and jitter
- the tail of the telemetry message carries the time stamp of each network device passing through.
- the embodiment of the present application provides a message transmission method, which is applied to a controller, and the method includes:
- the first mapping rule is used to instruct the first network device to forward the received message after caching the received message sent by the second network device for a preset period of time.
- the method also includes:
- the first mapping rule and the second mapping rule include a scheduling period, and the scheduling period is used to indicate a time period for packet forwarding;
- the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device is greater than or equal to the target delay, and the target delay is the first network device and the second network device time delay between.
- the method also includes:
- the quality of service includes delay and jitter; the tail of the telemetry message carries the time stamp of each network device passing through.
- the method before sending the first mapping rule to the first network device, the method further includes:
- the request message carries target transmission parameters
- the step of determining the first mapping rule according to the request message includes:
- the quality of service of each path between the first network device and the second network device it is determined that the quality of service satisfies the first mapping rule of the target transmission parameter.
- an embodiment of the present application provides a message transmission device, which is applied to a first network device, and the device includes:
- a first receiving unit configured to receive a message sent by a second network device
- the forwarding unit is configured to forward the received message after buffering the received message for a preset period of time.
- the embodiment of the present application provides a message transmission device, which is applied to a controller, and the device includes:
- the first sending unit is configured to send a first mapping rule to the first network device; the first mapping rule is used to instruct the first network device to cache the received message sent by the second network device for a preset period of time, Forward received messages.
- an embodiment of the present application provides a network device, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions that can be executed by the processor, and the processing The device is prompted by the machine-executable instructions to: implement any of the steps of the message transmission method provided in the first aspect above.
- an embodiment of the present application provides a controller, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions that can be executed by the processor, and the processing The machine is prompted by the machine-executable instructions to: realize the steps of any message transmission method provided in the second aspect above.
- the embodiment of the present application provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the above-mentioned first aspect or the second aspect provides Any of the message transmission method steps.
- the embodiment of the present application further provides a computer program, which, when running on a computer, causes the computer to execute any of the steps of the message transmission method provided in the first aspect or the second aspect.
- the first network device caches the received packets for a preset duration. Within the preset time period for which the first network device caches the received packet, the first network device may receive other packets belonging to the same flow as the packet. In this way, when the first network device forwards the received message after buffering the received message for a preset period of time, the jitter caused by forwarding the message of the same flow can be reduced, and deterministic transmission can be realized. It can be seen that in the technical solution provided by the embodiment of the present application, deterministic transmission can be realized by buffering the message on the network device at the receiving side. This deterministic transmission method does not require other network devices on the transmission path . This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
- FIG. 1 is a schematic diagram of a WAN provided by an embodiment of the present application.
- FIG. 2 is a schematic flowchart of the first message transmission method provided by the embodiment of the present application.
- Fig. 3 is a second schematic flow chart of the message transmission method provided by the embodiment of the present application.
- FIG. 4 is a schematic diagram of a received message provided by an embodiment of the present application.
- FIG. 5 is a schematic flowchart of a third message transmission method provided by an embodiment of the present application.
- FIG. 6 is a schematic flowchart of a fourth message transmission method provided by an embodiment of the present application.
- FIG. 7 is a schematic flowchart of a fifth message transmission method provided by the embodiment of the present application.
- FIG. 8 is a schematic flowchart of a sixth method of message transmission provided by an embodiment of the present application.
- FIG. 9 is another schematic diagram of the WAN provided by the embodiment of the present application.
- FIG. 10 is a schematic flowchart of a seventh message transmission method provided by an embodiment of the present application.
- FIG. 11 is a schematic flowchart of an eighth method of message transmission provided by an embodiment of the present application.
- FIG. 12 is a schematic diagram of the forwarding of the INT message provided by the embodiment of the present application.
- FIG. 13 is a schematic flowchart of a ninth method of message transmission provided by an embodiment of the present application.
- FIG. 14 is a schematic flowchart of a tenth message transmission method provided by the embodiment of the present application.
- FIG. 15 is a first structural schematic diagram of a message transmission device provided in an embodiment of the present application.
- FIG. 16 is a schematic diagram of a second structure of a message transmission device provided in an embodiment of the present application.
- FIG. 17 is a schematic structural diagram of a network device provided in an embodiment of the present application.
- FIG. 18 is a schematic structural diagram of a controller provided by an embodiment of the present application.
- Time Sensitive Network A set of Ethernet standards, through core technologies such as precise time synchronization and timing scheduling, to achieve time-synchronized low-latency streaming services, and provide low-latency isochronous services for each unit in the system Standard data, thereby providing the basis for the convergence of control, measurement, configuration, user interface (User Interface, UI) and file exchange infrastructure.
- TSN Time Sensitive Network
- Time slot Time is divided into time slots in equal parts, which is the smallest scheduling unit in TSN.
- Deterministic network refers to the network that guarantees the deterministic bandwidth, delay, jitter and packet loss rate indicators of the business; deterministic network technology is a new type of quality of service (Quality of Service, QoS) guarantee technology.
- QoS Quality of Service
- the demand for a deterministic network mainly comes from two aspects:
- Ethernet In traditional scenarios such as industrial automation and intelligent manufacturing, it is necessary to use Ethernet to uniformly replace dozens of fieldbus and real-time Ethernet standards, and integrate information technology (Information Technology, IT) networks and operational technology (Operational Technology) , OT) network, to realize the co-network transmission of best-effort flow and industrial delay-sensitive flow, and reduce costs.
- IT Information Technology
- OT Opera Technology
- deterministic transmission With the surge in communication traffic between machines, it is necessary to combine 5th Generation Mobile Communication Technology (5G) in emerging network application scenarios such as autonomous driving, remote surgery, and holographic communication. and other technologies to build a super high-speed rail in the network and realize end-to-end transmission of deterministic services, referred to as deterministic transmission.
- 5G 5th Generation Mobile Communication Technology
- Capacity expansion/light load capacity expansion is to expand the bandwidth, so that the network is in a state of light load. Now Ethernet has been able to achieve a single port bandwidth of 400Gbps.
- Traffic shaping Limit the speed of specific ports or traffic through technologies such as token bucket and credit shaping. For example, the bandwidth of the outbound port of the upstream node is 8Gbps, and the free bandwidth of the downstream node is only 2Gbps. This requires limiting the transmission bandwidth of the upstream node to less than 2Gbps to avoid congestion of the downstream node.
- Queue scheduling refers to scheduling traffic at the egress port of the switch. First, mark the packets with different priorities, then add the packets to the corresponding priority queues, and finally use different queue scheduling algorithms to process the packets. For example, Strict Priority (Strict Priority, SP) algorithm and Weighted Round Robin (WRR) algorithm.
- Strict Priority Strict Priority, SP
- WRR Weighted Round Robin
- the SP algorithm schedules strictly according to the high and low order of the queue priority. Only after all the packets in the high-priority queue are scheduled, the low-priority queue can be scheduled.
- the WRR algorithm assigns a weight to each queue, and forwards them sequentially according to the weight ratio, so as to prevent low-priority traffic from waiting for a long time.
- Congestion control When there is too much traffic and the buffer space of the buffer queue is insufficient, there will be congestion and packet loss in the network, which requires congestion control.
- explicit congestion notification (Explicit Congestion Notification, ECN) or Data Center Transmission Control Protocol (Data Center Transmission Control Protocol, DCTCP) based on explicit congestion marks or Timely, Swift, etc. based on round-trip delay (Round-Trip Time) can be used.
- RTT congestion control method to detect congestion, so that the upstream node until the sending end reduces the rate of sending messages.
- TDM time division multiplexing
- Clock synchronization That is, the clocks of the entire network are synchronized.
- the clocks of the terminal and the switch are the same, and the network card must also stamp hard time stamps on the packets.
- one is the master-slave mode, select the most accurate clock as the master clock, and other slave clocks are synchronized with the master clock; the other is the voting mode, for example, there are 9 devices in a domain, The current clock of 5 devices is 1:00, and the clock of 4 devices is 1:01. According to the principle of minority obeying the majority, all 9 devices are adjusted to 1:00.
- Time slot planning A time slot generally refers to a transmission resource in the time dimension of an egress port of a switch.
- the bandwidth of the outgoing port of a certain switch is 1Gbps, and a message has 1500 bytes (Byte), that is, 12000 bits (bit), the transmission of the message will occupy a certain period of 12 microseconds ( ⁇ s) of the outgoing port. Gap resources. Which time slot resource is occupied is determined by the transmission start time of the message.
- the network span is small: the above-mentioned TSN-based deterministic transmission is only suitable for layer-2 network forwarding, and the deterministic network is equivalent to a small-scale local area network.
- All network devices along the way must support TSN. If one of the network devices does not support TSN, it will not be able to achieve the effect of end-to-end deterministic transmission.
- the controller assigns a Segmented Identification (SID) to each network device, and specifies the egress port and forwarding period corresponding to the SID.
- SID Segmented Identification
- the network device parses the message header to obtain the SID carried in the message, and then determines the specific outbound port and forwarding period, and forwards the message through the determined outbound port according to the determined forwarding period.
- the above message transmission method based on the CSQF mechanism can solve the problem that the network span is small, but it still has the following disadvantages: all network devices along the way must support the CSQF mechanism.
- the actual network is very complex.
- the source terminal and the destination terminal span the WAN, and there are many network devices between the source terminal and the destination terminal. It is difficult for these network devices to support the CSQF mechanism. This makes deterministic transmission less adaptable to WAN in related technologies.
- the embodiment of the present application provides a message transmission method, which can be applied to the WAN shown in Figure 1, the WAN includes a controller and network devices R1-R9, as shown in Figure 1 In 1, only 9 network devices are used as an example for illustration, which does not serve as a limitation.
- the network device may be a router or a switch.
- the controller may be a software defined network (Software Defined Network, SDN) controller, or a collector, etc., which is not limited.
- SDN Software Defined Network
- the controller is used to manage the network devices of the entire WAN, perform path planning for deterministic transmission, and perform bandwidth reservation for deterministic transmission.
- terminal A is connected to network device R1
- terminal B is connected to network device R9
- the terminal A and terminal B need to cross the WAN.
- terminal A needs to perform end-to-end deterministic transmission with terminal B
- terminal A is the source terminal
- terminal B is the destination terminal
- the network device R1 connected to terminal A and the network device R9 connected to terminal B can be understood as gateway devices
- the network device R1 and the network device R9 are the key nodes of the end-to-end deterministic transmission, and the frequency of scheduling and forwarding of the two is the same.
- an embodiment of the present application provides a packet transmission method. As shown in FIG. 2 , the method is applied to a first network device. Wherein, the first network device may be any network device in the WAN.
- the above-mentioned method message transmission method comprises the following steps:
- Step S21 receiving a message sent by the second network device.
- Step S22 after caching the received message for a preset period of time, forwarding the received message.
- the first network device caches the received packets for a preset duration. Within the preset time period for which the first network device caches the received packet, the first network device may receive other packets belonging to the same flow as the packet. In this way, when the first network device forwards the received message after buffering the received message for a preset period of time, the jitter of forwarding the message of the same flow can be reduced, and deterministic transmission can be realized. It can be seen that in the technical solution provided by the embodiment of the present application, deterministic transmission can be realized by buffering the message on the network device at the receiving side. This deterministic transmission method does not require other network devices on the transmission path . This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
- the second network device may be any network device in the WAN.
- the second network device sends packets to other network devices.
- the message may be sent by the terminal to the second network device, or may be generated by the second network device itself.
- the first network device caches the received message, and forwards the received message after buffering for a preset period of time.
- the preset duration can be set according to actual needs.
- the preset duration may be 10 microseconds ( ⁇ s), 20 ⁇ s, or 30 ⁇ s, etc.
- the embodiment of the present application in order to reduce the jitter of packet forwarding in the same flow, the embodiment of the present application further provides a packet transmission method, as shown in FIG. 3 , the method may further include step S220.
- Step S220 performing reassembly processing on the received packets; after reassembly processing, the packets belonging to the same flow are arranged in order.
- the flow may be a data flow or a control flow.
- a packet header may carry a quintuple, and the quintuple is used to determine the stream to which the packet belongs.
- the header of the packet may carry a flow identifier, and the flow identifier is used to determine the flow to which the packet belongs.
- the first network device receives the packets, and performs reassembly processing on the received packets; after reassembly processing, the packets belonging to the same flow are arranged in order, that is, out-of-order recovery is realized.
- FIG. 4 a schematic diagram of a received message is shown in FIG. 4 .
- rectangular boxes represent packets, and packets with the same number are packets of the same flow.
- the first network device does not receive them sequentially.
- the first network device first receives a packet of flow 1, and then receives a packet of flow 2 and After a packet of stream 3, a packet of stream 1 is received.
- the first network is configured to reassemble the received packets so that the packets of the same flow are arranged sequentially, as shown on the right side of FIG. 4 .
- the first network device receives the packets, and reassembles the received packets; after the reassembly processing, the packets belonging to the same flow are arranged sequentially, which can further reduce the jitter of forwarding the packets of the same flow.
- the first network device may pre-store the first mapping rule, and reassemble the received message according to the first mapping rule.
- the first network device determines the first mapping rule corresponding to the flow to which the received message belongs, and then reassembles the received message according to the first mapping rule.
- the first mapping rule may include a scheduling queue; the scheduling queue is used to cache packets of the same flow.
- the first network device can cache packets of the same flow in the same scheduling queue, thereby realizing out-of-order recovery
- the first mapping rule may include a scheduling period, and the scheduling period is used to indicate a time period for packet forwarding.
- step S22 may be: after the scheduling period of the received message is reached, the received message is cached for a preset time period, and then the received message is forwarded.
- the preset duration is 1 scheduling period
- the scheduling period of the message is the Xth scheduling period
- the message is forwarded in the X to X+1 scheduling periods.
- the packet forwarding is periodically controlled, which facilitates the synchronization of packets and reduces the jitter of packet transmission.
- the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device can be greater than or equal to the target delay, and the target delay is the time delay between the first network device and the second network device delay. This can ensure that the first network device can process the message relatively quickly after receiving the message from the second network device, and reduce the time delay between the first network device and the second network device.
- the first mapping rule in order to control received packets and reduce jitter, may include a preset duration.
- the header of the packet sent by the second network device to the first network device may carry the first mapping rule.
- the scheduling frequencies of the first network device and the second network device are the same, and the scheduling frequency is a frequency for dividing a scheduling period. In this way, end-to-end jitter can be further ensured.
- a message transmission method is also provided, as shown in Figure 5, the method may include the following steps:
- Step S51 receiving a telemetry message sent by the second network device; the telemetry message is used to detect the service quality of each path between the second network device and the first network device.
- the quality of service may include but not limited to delay and jitter.
- the telemetry message may be an in-band network telemetry (In-band Network Telemetry, INT) message.
- INT In-band Network Telemetry
- the tail of the telemetry message carries the time stamp of each network device passing through.
- Step S52 sending a telemetry message to the controller.
- the controller determines the maximum delay of each path, specific encapsulation and processing operations, etc., to ensure that the deterministic transmission service is valid within the scope of QoS constraints.
- the embodiment of the present application also provides a message transmission method, as shown in Figure 6, the method is applied to the controller, including the following steps:
- Step S61 sending a first mapping rule to the first network device; the first mapping rule is used to instruct the first network device to forward the received message after buffering the received message sent by the second network device for a preset period of time.
- the controller can monitor the WAN.
- the controller may determine a new mapping rule, that is, the first mapping rule rule, sending the first mapping rule to the first network device.
- the controller may determine the first mapping rule in the following manner, as shown in FIG. 7:
- Step S71 receiving a request message sent by the second network device, where the request message is used to request a mapping rule for transmitting messages between the second network device and the first network device.
- Step S72 Determine the first mapping rule according to the request message.
- the controller when the controller receives the request message sent by the second network device, it determines the first mapping rule, and then executes step S61 to send the first mapping rule to the first network device, so that the second network device to Deterministic transmission between first network devices.
- the controller can issue mapping rules according to implementation requirements, which saves network resources.
- the above request message carries target transmission parameters; according to the quality of service of each path between the first network device and the second network device, determine the path whose quality of service meets the target transmission parameters and the first mapping rule . Afterwards, the second network device forwards the message to the first network device along the determined path, and the first network device forwards the message according to the first mapping rule, so that deterministic transmission of user requirements can be realized.
- the target transmission parameter may be bandwidth required for message transmission, time delay of message transmission, and the like.
- the embodiment of the present application also provides a message transmission method, as shown in FIG. 8, which may include the following steps:
- Step S81 receiving a telemetry message sent by the first network device, the telemetry message is used to detect the service quality of each path between the second network device and the first network device;
- Step S82 Determine the service quality of each path according to the information carried in the telemetry message.
- the controller can determine the maximum delay of each path, specific encapsulation and processing operations, etc., to ensure that the deterministic transmission service is valid within the scope of QoS constraints.
- the controller may also send the second mapping rule to the second network device.
- the first mapping rule and the second mapping rule include a scheduling period, and the scheduling period is used to indicate a time period for message forwarding;
- the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device is greater than or equal to the target delay, and the target delay is the delay between the first network device and the second network device.
- the message transmission method provided by the embodiment of the present application will be described below in conjunction with the WAN shown in FIG. 1 .
- the end-to-end deterministic transmission between terminal A and terminal B may include:
- the terminal A sends a message 1 to the network device R1, and the message 1 carries a flow identifier (Flow Identity, FlowID) 9.
- Flow Identity Flow Identity
- network device R1 After receiving packet 1, network device R1 determines the path 1 corresponding to flow identifier 1 according to the pre-stored correspondence between flow identifiers, paths, and mapping rules (as indicated by network device R1 ⁇ R3 ⁇ R7 ⁇ R9 in Figure 1 path) and mapping rule 1.
- SA represents the source address
- DA represents the destination address
- the dotted line with the arrow indicates the transmission path of the packet.
- F9, Q7, and T3 in the message represent mapping rules.
- mapping rule is a forwarding rule indicating the packet. Mapping rules can be set according to actual needs.
- the mapping rule may include, but is not limited to, information such as a scheduling queue corresponding to a flow identifier, a scheduling period, and a buffer time.
- mapping rules include FX1, QX2, and TX3.
- FX1 is FlowID
- QX2 is the scheduling queue identifier, which means the X2 queue, and the message carrying FlowID X1 is about to be mapped to the X2 queue
- TX3 is the scheduling cycle, which means the X3 scheduling cycle, that is, the message carrying FlowID X1 is scheduled at X3 Periodic forwarding.
- the mapping rule may also include a cache time (that is, the above-mentioned preset duration), so as to realize message synchronization and reduce message transmission jitter. For example, the cache time is 1 scheduling period. At this time, the above mapping rule indicates that the message carrying FlowID X1 is mapped to the X2 queue, and the message cached in the X2 queue is forwarded from the X3 to X3+1 scheduling period.
- mapping rule 1 includes F9, Q7 and T3, the cache time is one scheduling period, and path 1 is the path indicated by network device R1 ⁇ R3 ⁇ R7 ⁇ R9 in FIG. 1 .
- Network device R1 forwards message 1 to network device R9 along path 1 according to mapping rule 1, that is, message 1 carrying FlowID 9 is mapped to the 7th queue, and forwards the 7th queue to network device R9 in the 3rd-4th scheduling cycle Packet 1 cached in .
- the network device R1 can encapsulate the above-mentioned mapping rule 1 in the message header of the message 1, as shown in Figure 1, so that the network device R9 can accurately forward the message 1 according to the mapping rule 1, and realize deterministic transmission .
- the header of the packet shown in FIG. 1 may further include information such as the SID of each network device on the path.
- network device R1 may not encapsulate the above mapping rule 1 in the message header of message 1, as shown in Figure 9 WAN, SA represents the source address, DA represents the destination address, with The dotted line of the arrow indicates the transmission path of the packet.
- the R9 carried in the packet header represents the SID of the network device R9
- the R7 carried in the packet header represents the SID of the network device R7
- the R3 carried in the packet header represents the SID of the network device R3.
- SID The network device R9 determines the corresponding mapping rule 1 according to the correspondence between the locally stored flow identifier and the mapping rule.
- FIG. 9 only uses packet forwarding based on the SRv6 technology as an example for illustration. If other technologies are used for packet forwarding, the SID may not be carried in the packet header.
- the network device R9 After receiving the message 1, the network device R9 buffers the message 1 for a preset time according to the mapping rule 1, and then sends the message 1 to the terminal B, thereby realizing deterministic transmission.
- the seventh schematic flow chart of the message transmission method provided by the embodiment of the present application is applied to the second network device connected to the source terminal, and includes the following steps:
- step S101 a target packet sent by a source terminal is obtained, and the target packet carries a target flow identifier.
- the source terminal sends a message, that is, a target message, to the second network device.
- the flow identifier carried in the target packet is the target flow identifier.
- Step S102 according to the pre-stored correspondence between the flow identifier, the path and the mapping rule, determine the target path and the target mapping rule corresponding to the target flow identifier.
- the second network device pre-stores the correspondence between the flow identifier, the path, and the mapping rule. After obtaining the target packet, the second network device searches for the corresponding relationship including the target flow identifier in the pre-stored correspondence between the flow identifier, the path, and the mapping rule; after finding the corresponding relationship, the second network device will search for The path included in the found corresponding relationship is used as the target path corresponding to the target flow identifier, and the mapping rule included in the found corresponding relationship is used as the target mapping rule.
- Step S103 forward the target message along the target path to the first network device with the same frequency as the scheduled forwarding of the second network device, so that the first network device sends the target message to the first network device according to the target mapping rule
- the destination terminal of the connection sends the destination message.
- the first network device and the second network device schedule and forward packets at the same frequency.
- both the first network device and the second network device support the CSQF mechanism, and the first network device and the second network device use the same
- the scheduling frequency is divided into many scheduling cycles (Cycle). This ensures end-to-end network jitter and determines latency through bandwidth reservation and INT measurements.
- the second network device After acquiring the target path and the target mapping rule, the second network device forwards the target packet to the first network device along the target path according to the target mapping rule.
- the WAN may determine the path based on segment routing (Segment Routing, SR).
- segment Routing Internet Protocol Version 6
- the controller can use Segment Routing Internet Protocol Version 6 (SRv6) technology based on the sixth version of the Internet Protocol (Segment Routing Internet Protocol Version 6, SRv6) technology for each network device to segment the identifier (Segment Identifier, SID), and based on the SID of each network device, Complete end-to-end visibility, path planning, and bandwidth reservation.
- SID Segment Routing Internet Protocol Version 6
- SID Segment Identifier
- one or more network devices may be included on the target path. After receiving the target message, the one or more network devices do not need to determine the target message. The specific forwarding cycle of the message can be directly forwarded to the target message. After receiving the target message, the first network device may send the target message to the target terminal based on the CSQF mechanism and according to the target mapping rule.
- the second network device connected to the source terminal and the first network device connected to the destination terminal that is, the frequency of scheduling and forwarding of the two must be the same, for example, only the first network device
- the device and the second network device support the CSQF mechanism, and there is no requirement for other network devices between the first network device and the second network device, which can achieve definite delay and jitter, and deterministic transmission. This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
- the embodiment of the present application also provides a message transmission method, as shown in FIG. 11 , in this method, the following steps may be included before step S101:
- Step S1010 sending a transmission request message from the source terminal to the controller, where the transmission request message carries target transmission parameters, so that the controller can use the pre-stored quality of service of each path between the first network device and the second network device , determine the target path and target mapping rules that satisfy the target transfer parameters.
- the source terminal when the source terminal needs to deterministically transmit a message to the destination terminal, the source terminal sends a transmission request message to the second network device, and then the second network device sends a transmission request message to the controller, and the transmission request
- the message carries target transmission parameters, which may include but not limited to: FlowID, bandwidth required for message transmission, and message transmission delay.
- the quality of service of each path between the first network device and the second network device is pre-stored in the controller.
- the quality of service of a path includes the remaining bandwidth of the path, the delay of the path, and the queue resource of the path.
- the controller After receiving the transmission request message, the controller obtains the target transmission parameters from the transmission request message; according to the pre-stored service quality of each path between the first network device and the second network device, it is determined that the service quality meets the target transmission Arguments to the target path, and determine the target mapping rules.
- Step S1011 receiving the target path and the target mapping rule issued by the controller, and storing the corresponding relationship between the target flow identifier, the target path and the target mapping rule.
- the controller issues the target path and the target mapping rule to the second network device.
- the second network device receives the target path and the target mapping rule delivered by the controller, and then stores the corresponding relationship between the target flow identifier, the target path, and the target mapping rule.
- the second network device forwards the packet carrying the target flow ID based on the stored correspondence between the target flow ID, the target path, and the target mapping rule.
- the controller collects the quality of service of multiple paths between the first network device and the second network device, and performs unified planning on the paths, thereby realizing deterministic transmission.
- the controller after determining the target path and the target mapping rule, issues the corresponding target mapping rule to the first network device.
- the first network device stores the corresponding relationship between the target flow identifier and the target mapping rule, so as to realize accurate and deterministic transmission.
- the target mapping rule stored by the first network device is different from the target mapping rule stored by the second network device by a target delay.
- the target delay is the delay between the first network device and the second network device.
- the second network device may periodically send telemetry packets to the first network device along each path between the first network device and the second network device.
- the telemetry message is used to detect the service quality of each path between the first network device and the second network device.
- the first network device sends the received telemetry message to the controller.
- the controller After receiving the telemetry message sent by the first network device, the controller obtains the quality of service of each path between the first network device and the second network device from the telemetry message, and then stores the quality of service of each path between the first network device and the second network device. Quality of service for each path between network devices.
- the telemetry message may be an in-band network telemetry (In-band Network Telemetry, INT) message.
- INT In-band Network Telemetry
- the passing network device inserts the device information of the network device in the INT message, and the time stamp of the network device receiving the INT message and sending the INT message Timestamp of the text.
- the time stamp of the network device receiving the INT message and the time stamp of sending the INT message are collectively referred to as a time stamp, the time stamp is located at the end of the INT message, and the device information of the network device can be located in the message header of the INT message .
- FIG. 12 shows a schematic diagram of forwarding INT packets.
- SA represents the source address
- DA represents the destination address
- the dotted line with arrows indicates the transmission path of the INT message.
- network devices R1, R3, R7, and R9 support INT, and add timestamps to INT messages, and network devices R2 and R8 also pass through network devices, but network devices R2 and R8 do not support INT, so no Add a timestamp to the INT packet.
- the controller After the controller receives the INT message sent by the network device R9, it analyzes the timestamp carried in the INT message to determine the delay and jitter of the network device R1 ⁇ R3 ⁇ R7 ⁇ R9 path, and then completes the end-to-end End QoS detection. This is convenient for the controller to determine the maximum delay of each path, specific encapsulation and processing operations, etc., to ensure that the deterministic transmission service is valid within the QoS constraint range.
- the network device in order to detect the end-to-end QoS more accurately, when forwarding the INT message along the path from the second network device to the first network device, the network device on the way forwards the network device to the next hop device while , can send INT message to the controller.
- the controller can give an alarm in time to indicate that the network device is faulty, and then repair the network device in time.
- the embodiment of the present application also provides a message transmission method, as shown in FIG. 13 , which is applied to the first network device connected to the destination terminal, including the following steps:
- Step S131 receiving the target message sent by the second network device with the same scheduling and forwarding frequency as the first network device, the target message carries the target flow identifier, and the target message is: the second network device corresponds to the target according to the target flow identifier In the mapping rule, the message sent from the source terminal connected to the second network is sent along the target path.
- Step S132 sending the target message to the target terminal according to the target mapping rule.
- the above step S132 may specifically be: sending the target message to the target terminal according to the target mapping rule carried in the target message.
- the above step S132 may specifically be: according to the pre-stored correspondence between the flow ID and the mapping rule, determine the target mapping rule corresponding to the target flow ID ; According to the determined target mapping rule, send the target message to the target terminal.
- the first network device receives the target mapping rule issued by the controller, and the target mapping rule is: after the controller receives the transmission request message sent by the source terminal According to the pre-stored quality of service of each path between the second network device and the first network device, the determined mapping rule that satisfies the target transmission parameters carried in the transmission request message; stores the correspondence between the target flow identifier and the target mapping rule relation.
- the controller may also deliver the target flow identifier to the first network device while delivering the target mapping rule to the first network device.
- the first network device receives a telemetry message from the second network device, and the telemetry message is used to detect the service quality of each path between the second network device and the first network device; The message is sent to the controller.
- the telemetry packet may be an INT packet, or other types of telemetry packets.
- the second network device connected to the source terminal and the first network device connected to the destination terminal that is, the frequency of scheduling and forwarding of the two must be the same, for example, only the first The network device and the second network device support the CSQF mechanism, and there is no requirement for other network devices between the first network device and the second network device, which can achieve definite delay and jitter and deterministic transmission.
- This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
- the embodiment of the present application also provides a message transmission method, as shown in FIG. 14 , in this method, step S132 can be subdivided into steps S1321 and S14322.
- Step S1321 Reorder the target packets according to the target flow identifier, so that the target packets are adjacent to other packets corresponding to the target flow identifier.
- Step S1322 according to the object mapping rule, send the reordered object message to the destination terminal.
- the first network device uses the flow identifier to reorder the messages, that is, to reorganize the messages to achieve out-of-order recovery, to ensure that the messages belonging to the same data stream are sent in order, and to reduce jitter , and then achieve end-to-end deterministic transmission.
- an embodiment of the present application further provides a message transmission device, as shown in FIG. 15 , which is applied to the first network device, and the method includes:
- the first receiving unit 151 is configured to receive a message sent by the second network device
- the forwarding unit 152 is configured to forward the received message after buffering the received message for a preset period of time.
- the device also includes:
- the reassembly unit is used to reassemble the received messages; after the reassembly processing, the messages belonging to the same flow are arranged in sequence.
- the recombination unit is specifically used for:
- the first mapping rule includes a scheduling queue; the scheduling queue is used to cache packets of the same flow.
- the first mapping rule includes a scheduling period, and the scheduling period is used to indicate a time period for packet forwarding
- the forwarding unit is specifically used for:
- the received message is buffered for a preset time period, and then the received message is forwarded.
- the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device is greater than or equal to a target delay, and the target delay is the difference between the first network device and the second network device. Latency between second network devices.
- the first mapping rule includes the preset duration.
- the packet header of the packet carries the first mapping rule.
- the message header of the message carries a quintuple, and the quintuple is used to determine the flow to which the message belongs; or,
- the packet header of the message carries a target flow identifier, and the flow identifier is used to determine the flow to which the target packet belongs.
- the scheduling frequencies of the first network device and the second network device are the same, and the scheduling frequency is a frequency for dividing a scheduling period.
- the device also includes:
- the second receiving unit is configured to receive a telemetry message sent by the second network device; the telemetry message is used to detect the service quality of each path between the second network device and the first network device;
- the quality of service includes delay and jitter
- the tail of the telemetry message carries the time stamp of each network device passing through.
- the first network device caches the received packets for a preset duration. Within the preset time period for which the first network device caches the received packet, the first network device may receive other packets belonging to the same flow as the packet. In this way, when the first network device forwards the received message after buffering the received message for a preset period of time, the jitter caused by forwarding the message of the same flow can be reduced, and deterministic transmission can be realized. It can be seen that in the technical solution provided by the embodiment of the present application, deterministic transmission can be realized by buffering the message on the network device at the receiving side. This deterministic transmission method does not require other network devices on the transmission path . This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
- the embodiment of the present application also provides a message transmission device, as shown in FIG. 16, which is applied to a controller, and the device includes:
- the first sending unit 161 is configured to send a first mapping rule to the first network device; the first mapping rule is used to instruct the first network device to cache the received message sent by the second network device for a preset period of time , to forward the received message.
- the device also includes:
- a second sending unit configured to send the second mapping rule to the second network device
- the first mapping rule and the second mapping rule include a scheduling period, and the scheduling period is used to indicate a time period for packet forwarding;
- the time difference between the scheduling cycle of the first network device and the scheduling cycle of the second network device is greater than or equal to the target delay, and the target delay is the first network device and the second network device time delay between.
- the device also includes:
- a first receiving unit configured to receive a telemetry message sent by the first network device, where the telemetry message is used to detect the service quality of each path between the second network device and the first network device;
- the first determining unit is configured to determine the service quality of each path according to the information carried in the telemetry message.
- the quality of service includes delay and jitter; the tail of the telemetry message carries the time stamp of each network device passing through.
- the device also includes:
- the second receiving unit is configured to receive a request message sent by the second network device before sending the first mapping rule to the first network device, and the request message is used to request the second network device to send the first mapping rule to the first network device. Mapping rules for transmitting packets between network devices;
- the second determining unit is configured to determine the first mapping rule according to the request packet.
- the request message carries target transmission parameters
- the second determining unit is specifically used for:
- the quality of service of each path between the first network device and the second network device it is determined that the quality of service satisfies the first mapping rule of the target transmission parameter.
- the first network device caches the received packets for a preset duration. Within the preset time period for which the first network device caches the received packet, the first network device may receive other packets belonging to the same flow as the packet. In this way, when the first network device forwards the received message after buffering the received message for a preset period of time, the jitter caused by forwarding the message of the same flow can be reduced, and deterministic transmission can be realized. It can be seen that in the technical solution provided by the embodiment of the present application, deterministic transmission can be realized by buffering the message on the network device at the receiving side. This deterministic transmission method does not require other network devices on the transmission path . This enables the technical solutions provided by the embodiments of the present application to better adapt to complex WANs, and improves the adaptability of deterministic transmission to WANs.
- the embodiment of the present application also provides a network device, as shown in FIG. 17 , including a processor 171 and a machine-readable storage medium 172.
- the machine-readable storage medium 172 stores The machine-executable instructions executed by 171, the processor 171 is prompted by the machine-executable instructions to: implement any one of the above-mentioned steps of the packet transmission method applied to the first network device.
- the embodiment of the present application also provides a network device, as shown in FIG. 18 , including a processor 181 and a machine-readable storage medium 182.
- the machine-readable storage medium 182 stores 181 executes the machine-executable instructions, and the processor 181 is prompted by the machine-executable instructions to implement any one of the above-mentioned steps of the message transmission method applied to the controller.
- the machine-readable storage medium may include a random access memory (Random Access Memory, RAM), and may also include a non-volatile memory (Non-Volatile Memory, NVM), such as at least one magnetic disk memory.
- NVM non-Volatile Memory
- the machine-readable storage medium may also be at least one storage device located away from the aforementioned processor.
- the processor can be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; it can also be a digital signal processor (Digital Signal Processor, DSP), an application-specific integrated circuit ( Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
- CPU Central Processing Unit
- NP Network Processor
- DSP Digital Signal Processor
- ASIC Application Specific Integrated Circuit
- FPGA Field-Programmable Gate Array
- a computer-readable storage medium is also provided, and a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, any of the above-mentioned applications can be realized.
- a computer program is also provided, which, when run on a computer, causes the computer to execute any of the above-mentioned steps of the message transmission method applied to the first network device, or the above-mentioned Any one of the steps of the message transmission method applied to the controller.
- all or part of them may be implemented by software, hardware, firmware or any combination thereof.
- software When implemented using software, it may be implemented in whole or in part in the form of a computer program product.
- the computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, the processes or functions according to the embodiments of the present application will be generated in whole or in part.
- the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices.
- the computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.).
- the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media.
- the available medium may be a magnetic medium (such as a floppy disk, a hard disk, or a magnetic tape), an optical medium (such as a DVD), or a semiconductor medium (such as a Solid State Disk (SSD)).
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (23)
- 一种报文传输方法,其特征在于,应用于第一网络设备,所述方法包括:接收第二网络设备发送的报文;缓存所接收的报文预设时长后,转发所接收的报文。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:对所接收的报文进行重组处理;重组处理后,属于同一流的报文顺序排列。
- 根据权利要求2所述的方法,其特征在于,所述对所接收的报文进行重组处理的步骤,包括:根据第一映射规则,对所接收的报文进行重组处理。
- 根据权利要求3所述的方法,其特征在于,所述第一映射规则包括调度队列;所述调度队列用于缓存同一流的报文。
- 根据权利要求3所述的方法,其特征在于,所述第一映射规则包括调度周期,所述调度周期用于指示报文转发的时间段;所述缓存所接收的报文预设时长后,转发所接收的报文的步骤,包括:在达到所接收的报文的调度周期后,缓存所接收的报文预设时长后,转发所接收的报文。
- 根据权利要求5所述的方法,其特征在于,对于同一流,所述第一网络设备的调度周期与所述第二网络设备的调度周期的时间差大于等于目标时延,所述目标时延为所述第一网络设备与所述第二网络设备之间的时延。
- 根据权利要求3所述的方法,其特征在于,所述第一映射规则包括所述预设时长。
- 根据权利要求3-7任一项所述的方法,其特征在于,所述报文的报文头中携带所述第一映射规则。
- 根据权利要求1-7任一项所述的方法,其特征在于,所述报文的报文头中携带五元组,所述五元组用于确定所述报文所属流;或者,所述报文的报文头中携带流标识,所述流标识用于确定所述报文所属流。
- 根据权利要求1-7任一项所述的方法,其特征在于,所述第一网络设备和所述第二网络设备的调度频率相同,所述调度频率为划分调度周期的频率。
- 根据权利要求1-7任一项所述的方法,其特征在于,所述方法还包括:接收所述第二网络设备发送的遥测报文;所述遥测报文用于探测所述第二网络设备至第一网络设备之间每条路径的服务质量;向控制器发送所述遥测报文。
- 根据权利要求11所述的方法,其特征在于,所述服务质量包括时延和抖动;所述遥测报文的尾部携带途径的各个网络设备的时间戳。
- 一种报文传输方法,其特征在于,应用于控制器,所述方法包括:向第一网络设备发送第一映射规则;所述第一映射规则用于指示所述第一网络设备缓存所接收的第二网络设备发送的报文预设时长后,转发所接收的报文。
- 根据权利要求13所述的方法,其特征在于,所述方法还包括:向第二网络设备发送第二映射规则;所述第一映射规则和第二映射规则包括调度周期,所述调度周期用于指示报文转发的时间段;对于同一流,所述第一网络设备的调度周期与所述第二网络设备的调度周期的时间差大于等于目标时延,所述目标时延为所述第一网络设备与所述第二网络设备之间的时延。
- 根据权利要求13所述的方法,其特征在于,所述方法还包括:接收所述第一网络设备发送的遥测报文,所述遥测报文用于探测所述第二网络设备至第一网络设备之间每条路径的服务质量;根据所述遥测报文携带的信息,确定所述每条路径的服务质量。
- 根据权利要求13所述的方法,其特征在于,所述服务质量包括时延和抖动;所述遥测报文的尾部携带途径的各个网络设备的时间戳。
- 根据权利要求13所述的方法,其特征在于,在向第一网络设备发送第一映射规则之前,所述方法还包括:接收所述第二网络设备发送的请求报文,所述请求报文用于请求所述第二网络设备至第一网络设备之间传输报文的映射规则;根据所述请求报文,确定所述第一映射规则。
- 根据权利要求17所述的方法,其特征在于,所述请求报文携带目标传输参数;所述根据所述请求报文,确定所述第一映射规则的步骤,包括:根据第一网络设备至第二网络设备之间每条路径的服务质量,确定服务质量满足所述目标传输参数的路径以及所述第一映射规则。
- 一种报文传输装置,其特征在于,应用于第一网络设备,所述装置包括:第一接收单元,用于接收第二网络设备发送的报文;转发单元,用于缓存所接收的报文预设时长后,转发所接收的报文。
- 一种报文传输装置,其特征在于,应用于控制器,所述装置包括:第一发送单元,用于向第一网络设备发送第一映射规则;所述第一映射规则用于指示所述第一网络设备缓存所接收的第二网络设备发送的报文预设时长后,转发所接收的报文。
- 一种网络设备,其特征在于,包括处理器和机器可读存储介质,所述机器可读存储介质存储有能够被所述处理器执行的机器可执行指令,所述处理器被所述机器可执行指令促使:实现权利要求1-12任一所述的方法步骤。
- 一种控制器,其特征在于,包括处理器和机器可读存储介质,所述机器可读存储 介质存储有能够被所述处理器执行的机器可执行指令,所述处理器被所述机器可执行指令促使:实现权利要求13-18任一所述的方法步骤。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现权利要求1-12或13-18任一所述的方法步骤。
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020237040041A KR20230169378A (ko) | 2021-07-15 | 2021-07-15 | 메시지 전송 방법 및 디바이스 |
PCT/CN2021/106623 WO2023283902A1 (zh) | 2021-07-15 | 2021-07-15 | 一种报文传输方法及装置 |
JP2023571943A JP2024521725A (ja) | 2021-07-15 | 2021-07-15 | パケット伝送方法及びパケット伝送装置 |
EP21949688.2A EP4319055A4 (en) | 2021-07-15 | 2021-07-15 | MESSAGE TRANSMISSION METHOD AND APPARATUS |
CN202180001884.0A CN113711572A (zh) | 2021-07-15 | 2021-07-15 | 一种报文传输方法及装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2021/106623 WO2023283902A1 (zh) | 2021-07-15 | 2021-07-15 | 一种报文传输方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023283902A1 true WO2023283902A1 (zh) | 2023-01-19 |
Family
ID=78647593
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/106623 WO2023283902A1 (zh) | 2021-07-15 | 2021-07-15 | 一种报文传输方法及装置 |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP4319055A4 (zh) |
JP (1) | JP2024521725A (zh) |
KR (1) | KR20230169378A (zh) |
CN (1) | CN113711572A (zh) |
WO (1) | WO2023283902A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116232997A (zh) * | 2023-02-10 | 2023-06-06 | 中国联合网络通信集团有限公司 | 数据转发方法、装置及存储介质 |
CN116545936B (zh) * | 2023-07-05 | 2023-11-03 | 苏州浪潮智能科技有限公司 | 拥塞控制方法、系统、装置、通信设备及存储介质 |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023123103A1 (zh) * | 2021-12-29 | 2023-07-06 | 新华三技术有限公司 | 确定性流传输方法及设备 |
CN116647894A (zh) * | 2022-02-15 | 2023-08-25 | 大唐移动通信设备有限公司 | 数据调度方法、装置、设备及存储介质 |
CN114844837B (zh) * | 2022-04-25 | 2023-09-26 | 西安交通大学 | 多服务队列环境中基于时延的拥塞控制方法和控制装置 |
CN117014944A (zh) * | 2022-04-29 | 2023-11-07 | 上海华为技术有限公司 | 一种报文传输方法以及装置 |
CN114978754B (zh) * | 2022-06-21 | 2023-09-19 | 奥特酷智能科技(南京)有限公司 | 一种tsn异常检测方法及系统 |
WO2024016327A1 (zh) * | 2022-07-22 | 2024-01-25 | 新华三技术有限公司 | 报文传输 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017028545A1 (zh) * | 2015-08-14 | 2017-02-23 | 中兴通讯股份有限公司 | 端口队列堵塞的监控方法及系统 |
CN110166367A (zh) * | 2018-02-14 | 2019-08-23 | 华为技术有限公司 | 一种分组网络中控制流量的方法及装置 |
CN112202685A (zh) * | 2017-11-06 | 2021-01-08 | 华为技术有限公司 | 报文转发方法、转发设备和网络设备 |
CN113037640A (zh) * | 2019-12-09 | 2021-06-25 | 华为技术有限公司 | 数据转发方法、数据缓存方法、装置和相关设备 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106301973B (zh) * | 2015-05-14 | 2019-07-23 | 南宁富桂精密工业有限公司 | 网络检测方法与使用所述方法的控制器 |
EP3977692B1 (en) * | 2019-05-29 | 2022-10-12 | Telefonaktiebolaget LM Ericsson (publ) | Avoiding jitter in a communication system |
-
2021
- 2021-07-15 EP EP21949688.2A patent/EP4319055A4/en active Pending
- 2021-07-15 WO PCT/CN2021/106623 patent/WO2023283902A1/zh active Application Filing
- 2021-07-15 JP JP2023571943A patent/JP2024521725A/ja active Pending
- 2021-07-15 CN CN202180001884.0A patent/CN113711572A/zh active Pending
- 2021-07-15 KR KR1020237040041A patent/KR20230169378A/ko unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017028545A1 (zh) * | 2015-08-14 | 2017-02-23 | 中兴通讯股份有限公司 | 端口队列堵塞的监控方法及系统 |
CN112202685A (zh) * | 2017-11-06 | 2021-01-08 | 华为技术有限公司 | 报文转发方法、转发设备和网络设备 |
CN110166367A (zh) * | 2018-02-14 | 2019-08-23 | 华为技术有限公司 | 一种分组网络中控制流量的方法及装置 |
CN112866127A (zh) * | 2018-02-14 | 2021-05-28 | 华为技术有限公司 | 一种分组网络中控制流量的方法及装置 |
CN113037640A (zh) * | 2019-12-09 | 2021-06-25 | 华为技术有限公司 | 数据转发方法、数据缓存方法、装置和相关设备 |
Non-Patent Citations (1)
Title |
---|
See also references of EP4319055A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116232997A (zh) * | 2023-02-10 | 2023-06-06 | 中国联合网络通信集团有限公司 | 数据转发方法、装置及存储介质 |
CN116232997B (zh) * | 2023-02-10 | 2024-04-09 | 中国联合网络通信集团有限公司 | 数据转发方法、装置及存储介质 |
CN116545936B (zh) * | 2023-07-05 | 2023-11-03 | 苏州浪潮智能科技有限公司 | 拥塞控制方法、系统、装置、通信设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
JP2024521725A (ja) | 2024-06-04 |
KR20230169378A (ko) | 2023-12-15 |
EP4319055A1 (en) | 2024-02-07 |
CN113711572A (zh) | 2021-11-26 |
EP4319055A4 (en) | 2024-05-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2023283902A1 (zh) | 一种报文传输方法及装置 | |
US11245634B2 (en) | Time-sensitive networking (TSN) packet forwarding | |
US11018791B2 (en) | Method and device for time-controlled data transmission in a time-sensitive network | |
JP6032824B2 (ja) | パケット交換通信網におけるスケジューリング方法、エンドノード及びコアネットワークスイッチ | |
TWI756666B (zh) | 在封包交換網路中藉由通訊實體之電腦手段實施之方法、及其電腦程式及電腦可讀取之非暫時性記錄媒體、以及封包交換網路之通訊實體 | |
US10819535B2 (en) | Method for data packet transmission and/or reception | |
Imtiaz et al. | Approaches to reduce the latency for high priority traffic in IEEE 802.1 AVB networks | |
CN108282416A (zh) | 一种基于数据帧的调度方法和装置 | |
Amari et al. | AeroRing: Avionics full duplex ethernet ring with high availability and QoS management | |
CN115242728B (zh) | 一种报文传输方法及装置 | |
WO2013078873A1 (zh) | 识别应答报文的方法及设备 | |
US20240214323A1 (en) | Packet transmission method and apparatus | |
CN115643220A (zh) | 基于抖动时延的确定性业务传输方法和装置 | |
Cavalieri | Modelling and analysing congestion in KNXnet/IP | |
KR20230173697A (ko) | 이더넷 프레임의 송신을 스케줄링하기 위해 패킷 교환 네트워크에서 실시되는 방법, 컴퓨터 프로그램 및 기기 | |
WO2022068617A1 (zh) | 流量整形方法及装置 | |
WO2024016327A1 (zh) | 报文传输 | |
CN115037399A (zh) | 报文转发方法、电子设备和存储介质 | |
Steiner | Deterministic Ethernet for real-time and critical applications | |
CN117596200B (zh) | 一种时间敏感网络路由调度方法、电子设备、介质 | |
WO2023241063A1 (zh) | 报文处理方法、装置、系统及存储介质 | |
US20230283560A1 (en) | Converged avionics data network | |
CN115208837B (zh) | 一种报文调度方法和系统 | |
WO2024045832A1 (zh) | 队列调度方法及装置 | |
Yao et al. | Burst-Aware Mixed Flow Scheduling in Time-Sensitive Networks for Power Business |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21949688 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2021949688 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 18557364 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2021949688 Country of ref document: EP Effective date: 20231023 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2023571943 Country of ref document: JP |
|
ENP | Entry into the national phase |
Ref document number: 20237040041 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020237040041 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |